최신 312-39 무료덤프 - EC-COUNCIL Certified SOC Analyst (CSA)
In which of the following incident handling and response stages, the root cause of the incident must be found from the forensic results?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Rinni, SOC analyst, while monitoring IDS logs detected events shown in the figure below.
What does this event log indicate?
What does this event log indicate?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following factors determine the choice of SIEM architecture?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Sam, a security analyst with INFOSOL INC., while monitoring and analyzing IIS logs, detected an event matching regex /\\w*((\%27)|(\'))((\%6F)|o|(\%4F))((\%72)|r|(\%52))/ix.
What does this event log indicate?
What does this event log indicate?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which one of the following is the correct flow for Setting Up a Computer Forensics Lab?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Chloe, a SOC analyst with Jake Tech, is checking Linux systems logs. She is investigating files at /var/log/ wtmp.
What Chloe is looking at?
What Chloe is looking at?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Daniel is a member of an IRT, which was started recently in a company named Mesh Tech. He wanted to find the purpose and scope of the planned incident response capabilities.
What is he looking for?
What is he looking for?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
What is the process of monitoring and capturing all data packets passing through a given network using different tools?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
In which phase of Lockheed Martin's - Cyber Kill Chain Methodology, adversary creates a deliverable malicious payload using an exploit and a backdoor?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
An attacker exploits the logic validation mechanisms of an e-commerce website. He successfully purchases a product worth $100 for $10 by modifying the URL exchanged between the client and the server.
Original
URL: http://www.buyonline.com/product.aspx?profile=12
&debit=100
Modified URL: http://www.buyonline.com/product.aspx?profile=12
&debit=10
Identify the attack depicted in the above scenario.
Original
URL: http://www.buyonline.com/product.aspx?profile=12
&debit=100
Modified URL: http://www.buyonline.com/product.aspx?profile=12
&debit=10
Identify the attack depicted in the above scenario.
정답: C
설명: (DumpTOP 회원만 볼 수 있음)